ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Malicious Code Analysis using Metalanguage

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.3, No. 1)

Publication Date:

Authors : ;

Page : 192-194

Keywords : Malicious; Metalanguage.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Computer viruses are big threat to computer world; researchers doing work in this area have made various efforts in the direction of classification and detection methods of these viruses. Graph mining, system call arrangement and graphical analysis are some latest research activities in this field. The computability theory and the semi computable computable functions are quite important in our context of analyzing malicious activity. A mathematical model like random access stored program machine with the association attached background is used by Ferenc Leitold while explaining modeling of viruses in his paper. Computer viruses like polymorphic viruses and metamorphic viruses are using more efficient techniques for their evolution so it is required to use strong models to understand their evolution and then apply detection followed by the process of removal. Code Emulation is one of the strongest ways to analyze computer viruses but the anti-emulation activities made by virus designers are also active. Metalanguage and metaprogramming are used to analyze the malicious codes.

Last modified: 2014-09-15 22:58:52